Re: failing ssh login attempts

2018-01-12 Thread Ulf Volmer
On 12.01.2018 09:55, Adam Weremczuk wrote: > For the future - would you recommend a list / forum better suited for > these kinds of questions? the debian-user mailing list is usually a good place for all debian related questions. best regards, Ulf

Re: failing ssh login attempts

2018-01-12 Thread Adam Weremczuk
That was it, working now. Thank you Peter and everybody else who replied :) For the future - would you recommend a list / forum better suited for these kinds of questions? On 11/01/2018 17:08, Peter Ludikovsky wrote: Hi! The change was possibly introduced in the latest release, with the cha

Re: failing ssh login attempts

2018-01-11 Thread Ulf Volmer
On 11.01.2018 17:44, Adam Weremczuk wrote: > 11437 read(4, "from=\"*.example.com\" ssh-rsa XX"..., 4096) > = 4096 > Connection is established fine when I replace *.example.com with an IP > address but that's not very scalable. i guess, you ha

Re: failing ssh login attempts

2018-01-11 Thread Peter Ludikovsky
ting from 7.1 > landing at 9.2. > > I have a script running on another 7.1 machine which was connecting fine > to 7.1 but now it fails after reading authorized_keys file as below: > > 11437 read(4, "from=\"*.example.com\" ssh-rsa XX"..., 4096) >

failing ssh login attempts

2018-01-11 Thread Adam Weremczuk
Hi all, I recently performed a series of distro upgrades starting from 7.1 landing at 9.2. I have a script running on another 7.1 machine which was connecting fine to 7.1 but now it fails after reading authorized_keys file as below: 11437 read(4, "from=\"*.example.com

Re: Debian Live CD - unsecured ssh open by default

2015-02-21 Thread Ста Деюс
В Sat, 31 Jan 2015 18:09:58 -0600 John Goerzen пишет: > A friend of mine pointed out to me recently that the Debian Live CD > has ssh open to the network by default, and the "user" account -- > which has passwordless sudo to root privileges -- has a password that > is well-

Re: Debian Live CD - unsecured ssh open by default

2015-02-01 Thread John Goerzen
Great news, thanks! On 01/31/2015 07:01 PM, Evgeny Kapun wrote: > This should be fixed in the latest version. See > https://bugs.debian.org/741678. > > On 01.02.2015 03:09, John Goerzen wrote: >> Hello, >> >> A friend of mine pointed out to me recently that the Deb

Re: Debian Live CD - unsecured ssh open by default

2015-01-31 Thread Evgeny Kapun
This should be fixed in the latest version. See https://bugs.debian.org/741678. On 01.02.2015 03:09, John Goerzen wrote: > Hello, > > A friend of mine pointed out to me recently that the Debian Live CD has > ssh open to the network by default, and the "user" account -- wh

Debian Live CD - unsecured ssh open by default

2015-01-31 Thread John Goerzen
Hello, A friend of mine pointed out to me recently that the Debian Live CD has ssh open to the network by default, and the "user" account -- which has passwordless sudo to root privileges -- has a password that is well-known and easily found via Google. This poses some nasty surprises

weird ssh auth problem

2010-12-27 Thread Adrian von Bidder
session opened for user root by (uid=0) +++ and a password based sftp log in as (non-root) user shows: +++ Dec 27 10:29:13 zopf sshd[3287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.XX user=UU Dec 27 10:29:13 zopf sshd[3287]: Accepted password fo

Re: Cleanup portsentry's iptables rules (WAS: HEAD's UP: possible 0day SSH exploit in the wild)

2009-07-13 Thread Henrique de Moraes Holschuh
On Mon, 13 Jul 2009, Maik Holtkamp wrote: > I decided to follow this and on the weekend iptables blocked about 70 > IPs. I am afraid that after some time the box will be DOSed by the > crowded INPUT chain. The only _real_ fix for that is to use IPSET (patch for netfilter) to deal with IPv4, and co

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-13 Thread Marcin Gomulkiewicz
Roger Bumgarner wrote: ALLOW rules and SSH-keys. Using a non-standard port will stop the majority of automated attackers, but a dedicated attack will find you're SSH server: it only takes 20-30mins to portscan 1-65535. Not necessarily: http://jengelh.medozas.de/documents/Chaostables.pdf

Re: Cleanup portsentry's iptables rules (WAS: HEAD's UP: possible 0day SSH exploit in the wild)

2009-07-13 Thread Maik Holtkamp
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, Maik Holtkamp wrote/schrieb @ 13.07.2009 11:12: > tail -n -20 | sed "s/^-A/-D/" | \ s/tail/head/ Sorry. - -- - - bye maik -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (MingW32) Comment: Signature of Maik Holtkamp iEYEARECAAYFAkpbA

Cleanup portsentry's iptables rules (WAS: HEAD's UP: possible 0day SSH exploit in the wild)

2009-07-13 Thread Maik Holtkamp
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, Clemens Pfaffinger wrote/schrieb @ 07.07.2009 23:23: > this is standard for me. I always change the port of the openSSH-server. > > My (current) solution is: > Portsentry listens on port 22, while openSSH-server has another port. > Every port sc

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-10 Thread Russ Allbery
Peter Jordan writes: > hmmm, although i have set supported enctypes > supported_enctypes = aes256-cts:normal > and restarted kdc nothing seens to have changed. > > After calling "kinit" klist -5e show me: > Etype (skey, tkt): Triple DES cbc mode with HMAC/sha1, Triple DES cbc > mode with HM

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-10 Thread Peter Jordan
Russ Allbery, Fri Jul 10 2009 19:24:52 GMT+0200 (CEST): > Peter Jordan writes: >> Russ Allbery, Fri Jul 10 2009 16:31:14 GMT+0200 (CEST): > > >> But for new installations a change is not a bad idea? > > Yeah, for new installations it's generally best to start the master key > at the strongest s

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-10 Thread Russ Allbery
Peter Jordan writes: > Russ Allbery, Fri Jul 10 2009 16:31:14 GMT+0200 (CEST): >> Yes. The master key isn't used on the network and changing it is >> very difficult in lenny. > But for new installations a change is not a bad idea? Yeah, for new installations it's generally best to start the ma

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-10 Thread Peter Jordan
Russ Allbery, Fri Jul 10 2009 16:31:14 GMT+0200 (CEST): > Peter Jordan writes: > >> Let the option >> master_key_type = des3-hmac-sha1 >> as it is? > > Yes. The master key isn't used on the network and changing it is very > difficult in lenny. But for new installations a change is not a b

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-10 Thread Bastian Blank
On Fri, Jul 10, 2009 at 07:31:33AM -0700, Russ Allbery wrote: > Peter Jordan writes: > > We use NFSv4. > I think the current version may have that same problem. Urgs, yes. Bastian -- There is an order of things in this universe. -- Apollo, "Who Mourns for Adonais?" stardate 346

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-10 Thread Russ Allbery
"Boyd Stephen Smith Jr." writes: > Russ Allbery wrote: >> But yes, you don't want to get Kerberos tickets on an insecure system. > I thought tickets only lasted for a small period of time, and could be > expired early if need be so that you could use them on insecure > machines. True, you can g

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-10 Thread Boyd Stephen Smith Jr.
In <87ws6gppyi@windlord.stanford.edu>, Russ Allbery wrote: >Peter Jordan writes: >> Russ Allbery, Fri Jul 10 2009 00:56:57 GMT+0200 (CEST): >>> Not without applying custom patches that are rather a hack. You can, >>> however, do PKINIT, which lets you use smart cards that can do X.509 >>> aut

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-10 Thread Russ Allbery
ave not the > choice. Yeah, you're right -- that's a very hard one. Even ssh public key isn't horribly attractive in that situation. You're basically betting that whoever has hacked that cafe system has only installed a keyboard logger and hasn't bothered to do something

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-10 Thread Russ Allbery
Peter Jordan writes: > Russ Allbery, Fri Jul 10 2009 00:55:42 GMT+0200 (CEST): >> However, if you also have AFS, which I recall that you do, you can't >> turn it off at that level. You have to leave DES as a supported >> enctype since the AFS service key at present still has to be DES >> (althou

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-10 Thread Russ Allbery
Peter Jordan writes: > Let the option > master_key_type = des3-hmac-sha1 > as it is? Yes. The master key isn't used on the network and changing it is very difficult in lenny. > No change in /etc/krb5.conf required? Correct. Clients will negotiate the strongest available encryption key

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-10 Thread Peter Jordan
Russ Allbery, Fri Jul 10 2009 00:56:57 GMT+0200 (CEST): > Peter Jordan writes: > >> btw is it possible to use any kind of one time password mechanism with >> mit kdc? > > Not without applying custom patches that are rather a hack. You can, > however, do PKINIT, which lets you use smart cards th

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-10 Thread Peter Jordan
Russ Allbery, Fri Jul 10 2009 00:55:42 GMT+0200 (CEST): > Peter Jordan writes: >> Russ Allbery, Thu Jul 09 2009 21:51:50 GMT+0200 (CEST): > > > > However, if you also have AFS, which I recall that you do, you can't > turn it off at that level. You have to leave DES as a supported enctype > sin

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-10 Thread Peter Jordan
Russ Allbery, Fri Jul 10 2009 00:55:42 GMT+0200 (CEST): > Peter Jordan writes: >> Russ Allbery, Thu Jul 09 2009 21:51:50 GMT+0200 (CEST): > >>> Ensuring that you use AES enctypes for all keys (disable DES and >>> ideally also 3DES) > >> How? > > In /etc/krb5kdc/kdc.conf, set the supported_encty

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-09 Thread Russ Allbery
Peter Jordan writes: > btw is it possible to use any kind of one time password mechanism with > mit kdc? Not without applying custom patches that are rather a hack. You can, however, do PKINIT, which lets you use smart cards that can do X.509 authentication (some of which are quite inexpensive

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-09 Thread Russ Allbery
Peter Jordan writes: > Russ Allbery, Thu Jul 09 2009 21:51:50 GMT+0200 (CEST): >> Ensuring that you use AES enctypes for all keys (disable DES and >> ideally also 3DES) > How? In /etc/krb5kdc/kdc.conf, set the supported_enctypes configuration option for your realm to: supported_enctypes =

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-09 Thread Peter Jordan
Russ Allbery, Thu Jul 09 2009 21:51:50 GMT+0200 (CEST): > Peter Jordan writes: > >> It would be a stand alone MIT KDC (with krb-rsh) on debian lenny. >> >> "safe" in the sense of "you better attack the services which depends on >> kerberos than kerberos itself" > > That's what we've done at Stan

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-09 Thread Peter Jordan
Russ Allbery, Thu Jul 09 2009 21:51:50 GMT+0200 (CEST): > > Ensuring that you use AES enctypes for all keys (disable DES and ideally > also 3DES) > How? -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.deb

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-09 Thread Russ Allbery
Peter Jordan writes: > It would be a stand alone MIT KDC (with krb-rsh) on debian lenny. > > "safe" in the sense of "you better attack the services which depends on > kerberos than kerberos itself" That's what we've done at Stanford for many, many years, and I'm comfortable doing so. The Debian

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-09 Thread Russ Allbery
IT KDCs that > are exposed to the world and, incidentally, derive much advantage by > so doing. In my experience, common practice in the Active Directory world is to start by using VPN before doing anything else, which of course also works (although I find it more annoying and difficult to use t

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-09 Thread Peter Jordan
pod, Thu Jul 09 2009 21:38:31 GMT+0200 (CEST): > Peter Jordan writes: > >> It is not my decission to isolate kerberos. >> >> Is it safe to open kerberos for the world? > > It's not clear that anyone on this list can answer that question since it > depends on what "safe" and "kerberos" mean in th

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-09 Thread pod
Peter Jordan writes: > It is not my decission to isolate kerberos. > > Is it safe to open kerberos for the world? It's not clear that anyone on this list can answer that question since it depends on what "safe" and "kerberos" mean in the context of your organization. The meaning of "safe" is de

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-09 Thread Peter Jordan
Russ Allbery, Thu Jul 09 2009 20:45:57 GMT+0200 (CEST): > Peter Jordan writes: > >> I want to login passwordless to my ssh server from the internet. vpn >> is not avaiable and kerberos is not acccessable from outside the >> lan. How? > > Fix the last problem.

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-09 Thread Russ Allbery
Peter Jordan writes: > I want to login passwordless to my ssh server from the internet. vpn > is not avaiable and kerberos is not acccessable from outside the > lan. How? Fix the last problem. Otherwise, yes, you can't use Kerberos. Authentication systems really need to be

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-09 Thread Peter Jordan
> I want to login passwordless to my ssh server from the internet. vpn is not avaiable and kerberos is not acccessable from outside the lan. How? PJ -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-09 Thread Matt Richardson
The ISC has another diary entry on the exploit, voicing doubts about it [1]. The original diary entry [2] doesn't have any more updates on it, which is kind of a shame as that was where I was originally tracking the story. Anyway, there it is and I'm sure we'll hear more about it. [1] http://isc

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-09 Thread Noah Meyerhans
On Thu, Jul 09, 2009 at 06:02:37PM +0200, Peter Jordan wrote: > > If you have Kerberos, why would you use ssh keys? GSS-API is so much > > nicer if you already have a Kerberos environment. > > And how to login passwordless from outside the kerberos network? There's no suc

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-09 Thread Peter Jordan
Russ Allbery, Thu Jul 09 2009 17:04:06 GMT+0200 (CEST): > Peter Jordan writes: >> Noah Meyerhans, Wed Jul 08 2009 23:13:30 GMT+0200 (CEST): > > >> Do you use kerberos/nfsv4 and ssh keys? If yes, how you handle the >> problem, that the authorized_keys file is n

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-09 Thread Russ Allbery
Peter Jordan writes: > Noah Meyerhans, Wed Jul 08 2009 23:13:30 GMT+0200 (CEST): >> (Plus we've got Kerberos and don't usually mess around with keys or >> passwords). > Do you use kerberos/nfsv4 and ssh keys? If yes, how you handle the > problem, that the authori

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-09 Thread Guntram Trebs
Bernd Eckenfels schrieb: In article you wrote: Besides I dont think you can force both, its only one stage in ssh protocol. But your login shell could ask for the password via Terminal. Maybe with pam.. I think, you can, when you are hacking the source code of the server, but i'

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-08 Thread Peter Jordan
clarify this? > Would you recommend stopping ssh completely and switching to remote control? > Regards, > Justus > > I recompiled openssh lenny version for etch without problems. Are there any reasons against installing this version in etch? PJ -- To UNSUBSCRIBE, em

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-08 Thread Peter Jordan
d > well-maintained setup like e.g. One-Time-Pads or such - because both can > potentially be brute-forced way faster than SSH-keys. Why not using PasswordAuthentication and/or ChallangeResponseAuthetication like opie/otpw/freeauth? I think its better then passwordless ssh keys and strong pa

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-08 Thread Peter Jordan
Noah Meyerhans, Wed Jul 08 2009 23:13:30 GMT+0200 (CEST): > (Plus we've got Kerberos and don't usually mess around with keys or > passwords). > Do you use kerberos/nfsv4 and ssh keys? If yes, how you handle the problem, that the authorized_keys file is not accessable withou

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-08 Thread Bernd Eckenfels
rce both, its only one stage in ssh protocol. But your login shell could ask for the password via Terminal. Maybe with pam.. Greetings Bernd -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-08 Thread Sebastian Posner
Michael Stone wrote: [A way to enforce non-empty passwd on ssh-keys] > You can't, which is why it is useful to have both passwords and keys > simultaneously--you can enforce a policy on a password. To cite Noah Meyerhans from his recent mail - my users would shoot me if I ever t

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-08 Thread Michael Stone
On Wed, Jul 08, 2009 at 11:18:43PM +0200, Sebastian Posner wrote: Jim Popovitch wrote: Is there a way to force keys AND passwd verification? Normally you'd want to DISABLE PasswordAuthentication and ChallengeResponseAuthentication ... Something that would indeed be interesting is a way to en

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-08 Thread Noah Meyerhans
n when it comes to > PAM authentication. SSH-keys can (and should!) be password-protected > already. One of the big problems with ssh keys, though, is that there's no way for an admin to force a user's key to be password protected. On occasion, when there are other restrictions in place, pa

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-08 Thread Sebastian Posner
Jim Popovitch wrote: > > ALLOW rules and SSH-keys. > > Is there a way to force keys AND passwd verification? Normally you'd want to DISABLE PasswordAuthentication and ChallengeResponseAuthentication - unless you have a special and well-maintained setup like e.g. One-

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-08 Thread Roger Bumgarner
As far as I know, it does keys first then falls back to passwords. I'd imagine PAM could help, but I'm not knowledgeable enough in regards to that. I know you're only limited by your imagination when it comes to PAM authentication. SSH-keys can (and should!) be password-protected al

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-08 Thread Jameson Rollins
On Wed, Jul 08, 2009 at 09:37:55AM -0700, Jim Popovitch wrote: > On Wed, Jul 8, 2009 at 09:33, Roger Bumgarner > wrote: > > ALLOW rules and SSH-keys. > > Is there a way to force keys AND passwd verification? That's actually a really good question. I would be interest

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-08 Thread Jim Popovitch
On Wed, Jul 8, 2009 at 09:33, Roger Bumgarner wrote: > ALLOW rules and SSH-keys. Is there a way to force keys AND passwd verification? -Jim P. -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-08 Thread Roger Bumgarner
ALLOW rules and SSH-keys. Using a non-standard port will stop the majority of automated attackers, but a dedicated attack will find you're SSH server: it only takes 20-30mins to portscan 1-65535. -rb -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subje

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-08 Thread Rafael Moraes
Are you talking about trying the exploit on every single port? Then >> they would really be stupid. Calling nmap makes that much faster. >> >> No the code must be fixed if there is a hole, nothi

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-08 Thread Leandro Minatel
ally be stupid. Calling nmap makes that much faster. > > No the code must be fixed if there is a hole, nothing else helps but > turing off ssh. > > Best wishes > > Norbert > > > --- > Dr. No

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-08 Thread Norbert Preining
ere is a hole, nothing else helps but turing off ssh. Best wishes Norbert --- Dr. Norbert Preining Vienna University of Technology Debian Developer Debian TeX Group gpg DSA: 0x09C5B094

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-08 Thread Leandro Minatel
> > Right you are!, but, don't forget that there are more than 65500 ports to scan for ssh if it's not listening on the default one. I know, it's a matter of time, but, almost the majority of "mortals" give up if SSH is not in 22. Regards.

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-07 Thread Clemens Pfaffinger
Hi, this is standard for me. I always change the port of the openSSH-server. My (current) solution is: Portsentry listens on port 22, while openSSH-server has another port. Every port scan attempt will result in a ban via iptables and every connection to port 22 will also result in a ban via ipta

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-07 Thread Jeroen van Drongelen
It's helpfull indeed but withe a portscan they can easly find the other port of openssh.If have shutdown the openssh service untill i know wich version is attackable by this exploit or when they have a solution for it. Regards, Jeroen 2009/7/7 Leandro Minatel > Hi, > > a good practice, at leas

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-07 Thread Jeroen van Drongelen
servers already. > > Do you think tcpwrapping ssh service is enough, or should i use iptables > instead? > > Thanks in advance, > Regards > > -- > Ramūnas Čereškevičius > > Tel.: +370 600 48 371 > El.p.: ramu...@techsupport.lt > > * UNIX/Linux serveriai > *

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-07 Thread Leandro Minatel
Hi, a good practice, at least for me, is put openssh to listen in a different port than the default. I know, it's not the perfect solution. Regards.

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-07 Thread Justus
Is there Information on what Versions are affected by this exploit? I read something of Version 3.2 and 4.3 in one of the blog entrys (http://secer.org/hacktools/0day-openssh-remote-exploit.html), maybe someone else could clarify this? Would you recommend stopping ssh completely and switching to

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-07 Thread Clemens Pfaffinger
de Moraes Holschuh > As usual, you may want to either raise shields (i.e. disable/restrict > access > to the ssh service), or pay extra attention to what is happening on your > SSH > inbound gateways... > > http://lwn.net/Articles/340360/ > http://isc.sans.org/diary.

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-07 Thread Ramunas / techsupport.lt
Hi all, This is a serious security threat if it is not some sort of a duck (as we call it in our country). I have firewalled some servers already. Do you think tcpwrapping ssh service is enough, or should i use iptables instead? Thanks in advance, Regards -- Ramūnas Čereškevičius Tel

HEAD's UP: possible 0day SSH exploit in the wild

2009-07-07 Thread Henrique de Moraes Holschuh
As usual, you may want to either raise shields (i.e. disable/restrict access to the ssh service), or pay extra attention to what is happening on your SSH inbound gateways... http://lwn.net/Articles/340360/ http://isc.sans.org/diary.html?storyid=6742 http://secer.org/hacktools/0day-openssh-remote

Re: What to do about SSH brute force attempts?

2008-09-29 Thread titans team
Personally I am using SSHBlack for that. Very powerful script. Take a look there http://www.pettingers.org/code/sshblack.html Rgds, 2008/9/29 Brent Clark <[EMAIL PROTECTED]> > Brent Clark wrote: > >> Michael Tautschnig wrote: >> >>> Hi all, >>> >>> since two days (approx.) I'm seeing an extrem

Re: What to do about SSH brute force attempts?

2008-09-29 Thread Brent Clark
Brent Clark wrote: Michael Tautschnig wrote: Hi all, since two days (approx.) I'm seeing an extremely high number of apparently coordinated (well, at least they are trying the same list of usernames) brute force attempts from IP addresses spread all over the world. I've got denyhosts and an

Re: What to do about SSH brute force attempts?

2008-08-25 Thread Carlos Antelo
On Saturday 23 August 2008 04:28:32 Roger Bumgarner wrote: > I think they're more interested in using your computer to participate > in the botnet. sending spam / exploiting other machines is far more > lucrative that holding Joe Nobody's machine for ransom. unplug + > format = game over. > > -rb

Re: What to do about SSH brute force attempts?

2008-08-24 Thread mups . cp
7;t get hold of any passwords? Any ideas are welcome... >> > > change port from 22 to 1 or someone you like But this could break you in places where SSH acess is allowed but other ports not like in academia networks. I have saw some ssh attempts also in other ports instead of

Re: What to do about SSH brute force attempts?

2008-08-23 Thread Russ Allbery
Jack T Mudge III <[EMAIL PROTECTED]> writes: > I'm quite open to other interpretations, and I'd be glad to hear what > others think of this idea, but IMO, anyone attacking a linux machine is > probably doing so for reasons other than running a botnet. The brute force login attempts that we see, a

Re: What to do about SSH brute force attempts?

2008-08-23 Thread Victor Ananjevsky
В Thu, 21 Aug 2008 16:33:51 +0200 Michael Tautschnig <[EMAIL PROTECTED]> пишет: > > Further, what do you guys do about such attacks? Just sit back and > hope they don't get hold of any passwords? Any ideas are welcome... > change port from 22 to 1 or someone you like -- wbr Victor "Anana

Re: What to do about SSH brute force attempts?

2008-08-23 Thread Jack T Mudge III
> >> the root of these attacks. > >> > >> Well, probably I'm pretty naive in hoping that one could do anything > >> about that at all, but maybe some of you are more experienced in > >> security issues/dealing with CERTs, etc. and have some idea

Re: What to do about SSH brute force attempts?

2008-08-23 Thread Roger Bumgarner
ch attacks? Just sit back and hope >> they don't get hold of any passwords? Any ideas are welcome... >> >> Thanks, >> Michael > > redirect attackers to another port with a ssh honeypot with common attacked > accounts and stupid passwords, let take over false infor

Re: What to do about SSH brute force attempts?

2008-08-22 Thread Carlos Antelo
all, but maybe some of you are more experienced in security > issues/dealing with CERTs, etc. and have some ideas what could be done. > > Further, what do you guys do about such attacks? Just sit back and hope > they don't get hold of any passwords? Any ideas are welcome... >

Re: What to do about SSH brute force attempts?

2008-08-22 Thread Gerardo Castillo Alvarado
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 > Nevertheless, I'd like to do something about it more proactively, you can play with psad, fwsnort and fwknop. Greetings. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

Re: What to do about SSH brute force attempts?

2008-08-22 Thread Michael Tautschnig
> On Thursday 21 August 2008 11:33:51 Michael Tautschnig wrote: > > Hi all, > > > > since two days (approx.) I'm seeing an extremely high number of apparently > > coordinated (well, at least they are trying the same list of usernames) > > brute force attempts from IP addresses spread all over the w

Re: What to do about SSH brute force attempts?

2008-08-22 Thread Felipe Figueiredo
On Thursday 21 August 2008 11:33:51 Michael Tautschnig wrote: > Hi all, > > since two days (approx.) I'm seeing an extremely high number of apparently > coordinated (well, at least they are trying the same list of usernames) > brute force attempts from IP addresses spread all over the world. I've g

Re: What to do about SSH brute force attempts?

2008-08-22 Thread Brent Clark
Micah Anderson wrote: You could use dronebl, a dnsbl service, to check against and report attacks to (http://headcandy.org/rojo/ for some examples using fail2ban). micah Hi Thanks for this. It so obvious, I cant believe I didnt think of this myself. Kind Regards Brent Clark -- To UNSUBSCR

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Alexander Zangerl
On Thu, 21 Aug 2008 16:58:45 +0200, Michael Tautschnig writes: >> * use a Firewall to prevent other IP address to connect to your ssh >> service. restrict just to yours (iptables script can be easy to find on >> the web) >Well, I should have added that my hosts must be world-

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Roger Bumgarner
On Thu, Aug 21, 2008 at 7:58 AM, Michael Tautschnig <[EMAIL PROTECTED]> wrote: >> Third use a non standart ssh port (for example ) apt-get install fail2ban >> > I'm not a huge fan of security by obscurity, so I'd rather stick with 22 for > now. > "S

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Chris Davies
> Third use a non standart ssh port (for example ) Michael Tautschnig <[EMAIL PROTECTED]> wrote: > I'm not a huge fan of security by obscurity, so I'd rather stick with 22 for > now. Try it before you dismiss it out of hand. Chris -- To UNSUBSCRIBE, email to

FW: What to do about SSH brute force attempts?

2008-08-21 Thread Tammo Schuelke
> -Original Message- > From: Henrique de Moraes Holschuh [mailto:[EMAIL PROTECTED] > Sent: Thursday, August 21, 2008 5:21 PM > To: Michael Tautschnig > Cc: debian-security@lists.debian.org > Subject: Re: What to do about SSH brute force attempts? > > On Thu, 21 Au

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Brent Clark
l iptables based firewall solution in place to mitigate these since quite some time already and this seems to do the trick in terms of blocking them fairly quickly. Hi Theres not much you can do. Obviously you need to be using SSH Protocol 2, latest openssh server, strong passwords for uses

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Andreas Moog
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Michael Tautschnig wrote: >> Yes, but could I really expect police to act "just because of a >> bunch of hosts >> being under attack?" And even more so, could I expect any police of >> foreign countries to react? No, probably not right now. But as mo

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Micah Anderson
trigger a denyhosts DOS to > > lock out anyone they want. > > > > Hmm, no, not really - how would that work? fail2ban and denyhosts watch log files for repeat failed ssh authentication attempts from particular ips. Its quite trivial for a non-privileged user to add entries to

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Micah Anderson
lways write a script that will send an email after every SSH > bruteforce attack to a mail address from whois database. That way you don't > have to do it manually, and still you can do some good deed if someone has a > server that's broken into, and is not (yet) aware of t

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Michael Tautschnig
> * Michael Tautschnig <[EMAIL PROTECTED]> [2008-08-21 07:35-0400]: > > Hi all, > > > > since two days (approx.) I'm seeing an extremely high number of apparently > > coordinated (well, at least they are trying the same list of usernames) > > brute > > force attempts from IP addresses spread all

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Michael Tautschnig
> Assuming that your system is secured as well as can be, and that your > question is not about how to fend off attacks but rather how to stop your > attackers from being able to continue, isn't this the kind of thing that the > police or other law enforcement agencies would normally investigate? >

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Micah Anderson
* Michael Tautschnig <[EMAIL PROTECTED]> [2008-08-21 07:35-0400]: > Hi all, > > since two days (approx.) I'm seeing an extremely high number of apparently > coordinated (well, at least they are trying the same list of usernames) brute > force attempts from IP addresses spread all over the world. I

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Jakov Sosic
On Thursday 21 August 2008 16:57:27 Max Zimmermann wrote: > The problem with reporting the IPs is, that it can become a very big > task, as the number of IPs denyhosts blocks increases. You can always write a script that will send an email after every SSH bruteforce attack to a mail a

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Henrique de Moraes Holschuh
On Thu, 21 Aug 2008, Michael Tautschnig wrote: > > * use a Firewall to prevent other IP address to connect to your ssh > > service. restrict just to yours (iptables script can be easy to find on > > the web) > Well, I should have added that my hosts must be world-wide access

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Max Zimmermann
re in the world where you can't really do them any harm, > or are infected or compromised systems of people that don't know that > their machines are running such 'attacks'. > > So I thing reporting is pretty much the only thing you can do. You won't > be able t

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Max Zimmermann
ress criminal charges against anyone I think. The problem with reporting the IPs is, that it can become a very big task, as the number of IPs denyhosts blocks increases. Another advice I can give is to change the SSH port. That minimized bruteforces to almost zero for me. So long. -- Cheers, Max Linux-User #477672 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Michael Tautschnig
> Hi, > > * use a Firewall to prevent other IP address to connect to your ssh > service. restrict just to yours (iptables script can be easy to find on > the web) Well, I should have added that my hosts must be world-wide accessible using password-based authentication, so th

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Sam Kuper
Assuming that your system is secured as well as can be, and that your question is not about how to fend off attacks but rather how to stop your attackers from being able to continue, isn't this the kind of thing that the police or other law enforcement agencies would normally investigate? Sam

Re: What to do about SSH brute force attempts?

2008-08-21 Thread GREG
Hi, * use a Firewall to prevent other IP address to connect to your ssh service. restrict just to yours (iptables script can be easy to find on the web) * use Fail2ban which can ban ssh auth failure and create iptables rules. (google can help your search about fail2ban) Third use a non standart

Re: What to do about SSH brute force attempts?

2008-08-21 Thread John Keimel
On Thu, Aug 21, 2008 at 10:33 AM, Michael Tautschnig <[EMAIL PROTECTED]> wrote: > Hi all, > > since two days (approx.) I'm seeing an extremely high number of apparently > coordinated (well, at least they are trying the same list of usernames) brute > force attempts from IP addresses spread all over

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Andreas Moog
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Michael Tautschnig wrote: > Nevertheless, I'd like to do something about it more proactively, so I also > contact the abuse mailboxes as obtained from whois. Thats pretty much the only thing you can do about it. But one should not be too hopeful tha

  1   2   3   4   5   6   7   8   9   10   >